Commit 9e995645b54de7aa77c0b56c9507a2153e81f92f
1 parent
94855937
Fix texinfo syntax errors.
Signed-off-by: Stefan Weil <weil@mail.berlios.de> Signed-off-by: Aurelien Jarno <aurelien@aurel32.net> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6761 c046a42c-6fe2-441c-8c8c-71466251a162
Showing
1 changed file
with
3 additions
and
3 deletions
qemu-doc.texi
@@ -638,7 +638,7 @@ and SASL party. For x509 certs, the ACL check is made against the | @@ -638,7 +638,7 @@ and SASL party. For x509 certs, the ACL check is made against the | ||
638 | certificate's distinguished name. This is something that looks like | 638 | certificate's distinguished name. This is something that looks like |
639 | @code{C=GB,O=ACME,L=Boston,CN=bob}. For SASL party, the ACL check is | 639 | @code{C=GB,O=ACME,L=Boston,CN=bob}. For SASL party, the ACL check is |
640 | made against the username, which depending on the SASL plugin, may | 640 | made against the username, which depending on the SASL plugin, may |
641 | -include a realm component, eg @code{bob} or @code{bob\@EXAMPLE.COM}. | 641 | +include a realm component, eg @code{bob} or @code{bob@@EXAMPLE.COM}. |
642 | When the @option{acl} flag is set, the initial access list will be | 642 | When the @option{acl} flag is set, the initial access list will be |
643 | empty, with a @code{deny} policy. Thus no one will be allowed to | 643 | empty, with a @code{deny} policy. Thus no one will be allowed to |
644 | use the VNC server until the ACLs have been loaded. This can be | 644 | use the VNC server until the ACLs have been loaded. This can be |
@@ -1423,14 +1423,14 @@ always @code{deny} | @@ -1423,14 +1423,14 @@ always @code{deny} | ||
1423 | @item acl allow <aclname> <match> [<index>] | 1423 | @item acl allow <aclname> <match> [<index>] |
1424 | add a match to the access control list, allowing access. The match will | 1424 | add a match to the access control list, allowing access. The match will |
1425 | normally be an exact username or x509 distinguished name, but can | 1425 | normally be an exact username or x509 distinguished name, but can |
1426 | -optionally include wildcard globs. eg @code{*\@EXAMPLE.COM} to allow | 1426 | +optionally include wildcard globs. eg @code{*@@EXAMPLE.COM} to allow |
1427 | all users in the @code{EXAMPLE.COM} kerberos realm. The match will | 1427 | all users in the @code{EXAMPLE.COM} kerberos realm. The match will |
1428 | normally be appended to the end of the ACL, but can be inserted | 1428 | normally be appended to the end of the ACL, but can be inserted |
1429 | earlier in the list if the optional @code{index} parameter is supplied. | 1429 | earlier in the list if the optional @code{index} parameter is supplied. |
1430 | @item acl deny <aclname> <match> [<index>] | 1430 | @item acl deny <aclname> <match> [<index>] |
1431 | add a match to the access control list, denying access. The match will | 1431 | add a match to the access control list, denying access. The match will |
1432 | normally be an exact username or x509 distinguished name, but can | 1432 | normally be an exact username or x509 distinguished name, but can |
1433 | -optionally include wildcard globs. eg @code{*\@EXAMPLE.COM} to allow | 1433 | +optionally include wildcard globs. eg @code{*@@EXAMPLE.COM} to allow |
1434 | all users in the @code{EXAMPLE.COM} kerberos realm. The match will | 1434 | all users in the @code{EXAMPLE.COM} kerberos realm. The match will |
1435 | normally be appended to the end of the ACL, but can be inserted | 1435 | normally be appended to the end of the ACL, but can be inserted |
1436 | earlier in the list if the optional @code{index} parameter is supplied. | 1436 | earlier in the list if the optional @code{index} parameter is supplied. |